Tim Pierson here, Yes it is being rolled out to Europe this fall at
TSTC.NL and Sequrit.nl. It will also be taught in German, French, and Spanish using English materials late this quarter. The course is currently avail in many areas in the US currently. Just Google the title below in bold and you can check out the nearest partner who is delivering it in your area. The course title is actually, Hacking Uncovered:VMware - What every system administrator should know. The Hacking Uncovered part was used to make it catchy.
The title was a little long so we shortened it to
Hacking Uncovered:VMware.
Let me give you a little history of why I did this.
First off let me say that VMware is probably one of the most secure environments I have ever worked with, given that it is installed in a secure manner. It is NOT secure out of the box taking the defaults in my opinion. Of course I could post quite a few of my exploits I have uncovered in developing the course on a You Tube video and how to steal credentials from your virtual environment, even the complex password protected vpxuser that connects the Host to the VC by simply rebooting the Host and waiting for it to drop this in your lap. But this is not about providing Hackers ammuntion, it is about securing our DataCenters. Now in VMware' defense the right conditions would have to be met, and you would have to have access to the network segment that the VC and Host are on, but it is alarming none the less. A sample of an actual intercept is posted below.
xmlns="urn:vpxa3"><_this type="VpxapiVpxaService">vpxa</_this><userName>vpxuser</userName><password>*{color:#ff0000}BkGiD3-b6:F8]d28\lBk=b{2993H[rag*{color}</password><soapPort>443</soapPort><hostIp>172.16.4.40</hostIp></LoginVpxa>
Texiwill and I showed this to VMware at VMWorld since then we have been exchanging emails with the security department so they can recreate and address this. We show you those exploits in the class so that you can more easily protect yourself in your environment
Continue reading "The VMware Hacking Course will become available..." »